| Index: net/base/x509_certificate_win.cc
|
| diff --git a/net/base/x509_certificate_win.cc b/net/base/x509_certificate_win.cc
|
| index 4905b0bf8265d0e773c6b61446b483435300e1fb..483e78506ad60044771e30afad2b972eb7b7e923 100644
|
| --- a/net/base/x509_certificate_win.cc
|
| +++ b/net/base/x509_certificate_win.cc
|
| @@ -870,14 +870,6 @@ int X509Certificate::VerifyInternal(const std::string& hostname,
|
| verify_result->cert_status |= MapCertChainErrorStatusToCertStatus(
|
| chain_context->TrustStatus.dwErrorStatus);
|
|
|
| - // Treat certificates signed using broken signature algorithms as invalid.
|
| - if (verify_result->has_md4)
|
| - verify_result->cert_status |= CERT_STATUS_INVALID;
|
| -
|
| - // Flag certificates signed using weak signature algorithms.
|
| - if (verify_result->has_md2)
|
| - verify_result->cert_status |= CERT_STATUS_WEAK_SIGNATURE_ALGORITHM;
|
| -
|
| // Flag certificates that have a Subject common name with a NULL character.
|
| if (CertSubjectCommonNameHasNull(cert_handle_))
|
| verify_result->cert_status |= CERT_STATUS_INVALID;
|
|
|